PAN-OS Root and Default Certificate are going to expire on December 31, 2023 which will make Firewalls and Panorama loose connectivity to Palo Alto Networks cloud services.This will potentially cause outages and impact network traffic.
PAN-OS Root and Default Certificate are going to expire on December 31, 2023 which will make Firewalls and Panorama loose connectivity to Palo Alto Networks cloud services.This will potentially cause outages and impact network traffic.
In the last two weeks we have received many support requests because of non-functioning SSL connections from our Fortinet, Palo Alto Networks and Watchguard customers. Incoming SSL connections on port tcp/443 suddenly stop working. These can be SSLVPNs, Global Protect connections, port forwardings (VIPs, Destination NAT) for internal web servers…
We have created a cheat sheet for Palo Alto firewalls with all important commands for troubleshooting.The cheat sheet was created for PANOS version 10.1. We have divided the cheat sheet into different sections like general commands, session debugging, service debugging and feature related debugging commands so that the needed commands…
Hi all, another vulnerability – log4j – is keeping us all on our toes.In this blog article you will find information about log4j from our vendors.
If you want to configure rules for Saas services on the PaloAlto Firewall, you can do this using the App ID for the particular service, or you can use the IP addresses, Domains or URLs of the service in the policy. However, since Saas services typically do not use only…
Microsoft has released KB5003646 on the 6th of June 2021. Part of this update is a security hardening measurement to align with recommendations as a conclusion out of CVE-2021-31958. As a known issue of this KB5003646, microsoft has noted in the release notes: “After installing this or later updates, apps…
Let’s mention the important things first: Please patch you vulnerable Exchange 2013, 2016 and 2019 immediately! The page msxfaq has published an infosite to this vulnerability including the instructions how to fix your Exchange. Some security researchers have demonstrated three high risk vulnerabilities for exchange server systems. Microsoft has published…
Let’s mention the important things first: Please patch you vulnerable Exchange 2013, 2016 and 2019 immediately! The page msxfaq has published an infosite to this vulnerability including the instructions how to fix your Exchange. Even though we, as Boll Engineering AG, are not associated in any way with the affected…
With the possibility to include external lists from third parties via the feature “External Dynamic List EDL”, this opens up many possibilities to restrict your own security policies even better and to prevent access to the TOR network. In the following tutorial I will show you how to configure the…
Since a while, the most recent macOS versions the system do report the use of “legacy system extensions” which is often triggered by modules or plugins of low-level software like VPN Clients, AV software etc.